Results 161 to 170 of about 10,475,631 (365)
“The Pause That Refreshes”: American Servicemen on R&R in Australia, 1967–1971
Nearly 10% of the 3 million Americans who served in Vietnam spent one week of “R&R” leave in Australia—principally in Sydney. This “friendly invasion” constitutes a substantial neglected legacy of the conflict. Across dozens of oral history interviews and memoirs, US servicemen recall with fondness their week‐long respite in a nation that was at once ...
Chris Dixon, Jon Piccini
wiley +1 more source
An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things. [PDF]
Ahmed AA, Ahmed WA.
europepmc +1 more source
Hash Functions from Sigma Protocols and Improvements to VSH [PDF]
Mihir Bellare, Todor Ristov
openalex +1 more source
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos+4 more
wiley +1 more source
Robust Multi-property Combiners for Hash Functions Revisited [PDF]
Marc Fischlin+2 more
openalex +1 more source
Current application of blockchain technology in healthcare and its potential roles in Urology
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban+6 more
wiley +1 more source
ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper.
E. V. Listopad
doaj
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
John Kelsey, Bruce Schneier
openalex +1 more source
Secure network coding with minimum overhead based on hash functions [PDF]
Majid Adeli, Huaping Liu
openalex +1 more source